
Research
Malicious fezbox npm Package Steals Browser Passwords from Cookies via Innovative QR Code Steganographic Technique
A malicious package uses a QR code as steganography in an innovative technique.
In-place editing with Twitter Bootstrap, jQuery UI or pure jQuery.
Unfortunately, project is currently frozen, as I don't have enough time for it. You could try use it as is, but there may be some bugs with newer versions of dependend libraries (e.g. bootstrap). I would really appreciate if someone take care of it.. See #610. Vitalets.
http://vitalets.github.io/x-editable/demo.html
http://vitalets.github.io/x-editable
Use http://vitalets.github.io/x-editable main page.
bower install x-editable
Bootstrap 3 build:
<link href="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/bootstrap3-editable/css/bootstrap-editable.css" rel="stylesheet"/>
<script src="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/bootstrap3-editable/js/bootstrap-editable.min.js"></script>
Bootstrap 2 build:
<link href="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/bootstrap-editable/css/bootstrap-editable.css" rel="stylesheet"/>
<script src="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/bootstrap-editable/js/bootstrap-editable.min.js"></script>
jQuery UI build:
<link href="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/jqueryui-editable/css/jqueryui-editable.css" rel="stylesheet"/>
<script src="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/jqueryui-editable/js/jqueryui-editable.min.js"></script>
jQuery only build:
<link href="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/jquery-editable/css/jquery-editable.css" rel="stylesheet"/>
<script src="//cdnjs.cloudflare.com/ajax/libs/x-editable/1.5.0/jquery-editable/js/jquery-editable-poshytip.min.js"></script>
Please provide jsFiddle when creating issues!
It's really saves much time. Use these as template:
A few steps how to start contributing.
Assuming you have Node.js already installed.
1.Fork X-editable on github and clone it to your local mashine:
git clone https://github.com/<your-github-name>/x-editable.git -b dev
2.Install grunt-cli globally (if not yet):
npm i -g grunt-cli
3.Install dependencies:
cd x-editable
npm i
4.Make your changes:
vim editable-form.js
5.Write some tests for your changes:
vim /test/unit/*.js
6.Run tests in cli:
grunt test
or directly in browser:
grunt server
and open http://127.0.0.1:8000/test
By default test run on bootstrap 3 popup version, but you can test any other build:
7.Commit and push back on github:
git add .
git commit -m'refactor editable form, fix #123'
git push origin
8.Make pull request on github (to dev
branch).
Thanks for your support!
To build x-editable locally please run:
grunt build
Result will appear in dist
directory.
Copyright (c) 2012 Vitaliy Potapov
Licensed under the MIT license.
FAQs
In-place editing with Twitter Bootstrap, jQuery UI or pure jQuery
We found that x-editable demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
A malicious package uses a QR code as steganography in an innovative technique.
Research
/Security News
Socket identified 80 fake candidates targeting engineering roles, including suspected North Korean operators, exposing the new reality of hiring as a security function.
Application Security
/Research
/Security News
Socket detected multiple compromised CrowdStrike npm packages, continuing the "Shai-Hulud" supply chain attack that has now impacted nearly 500 packages.